Cyberattacks & Data Breaches
The DeepSeek logo![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6ba00013f7ce94a5/67a511492737975a3d060ba3/deepseek_mundissima_shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale)
Cyber Risk![](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt6ba00013f7ce94a5/67a511492737975a3d060ba3/deepseek_mundissima_shutterstock.jpg?width=700&auto=webp&quality=80&disable=upscale)
DeepSeek Phishing Sites Pursue User Data, Crypto WalletsDeepSeek Phishing Sites Pursue User Data, Crypto Wallets
Riding the wave of notoriety from the Chinese company's R1 AT chatbot, attackers are spinning up lookalike sites for different malicious use cases.
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.